Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=2 et sw=2 tw=80: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
5 * You can obtain one at http://mozilla.org/MPL/2.0/. */
7 // Original author: ekr@rtfm.com
9 #include "logging.h"
10 #include "nspr.h"
11 #include "prerror.h"
12 #include "prio.h"
14 #include "nsCOMPtr.h"
15 #include "nsASocketHandler.h"
16 #include "nsISocketTransportService.h"
17 #include "nsNetCID.h"
18 #include "nsServiceManagerUtils.h"
19 #include "nsXPCOM.h"
21 #include "transportflow.h"
22 #include "transportlayerprsock.h"
24 namespace mozilla {
26 MOZ_MTLOG_MODULE("mtransport")
28 nsresult TransportLayerPrsock::InitInternal() {
29 // Get the transport service as a transport service
30 nsresult rv;
31 stservice_ = do_GetService(NS_SOCKETTRANSPORTSERVICE_CONTRACTID, &rv);
33 if (!NS_SUCCEEDED(rv)) {
34 MOZ_MTLOG(ML_ERROR, "Couldn't get socket transport service");
35 return rv;
36 }
38 return NS_OK;
39 }
41 void TransportLayerPrsock::Import(PRFileDesc *fd, nsresult *result) {
42 if (state_ != TS_INIT) {
43 *result = NS_ERROR_NOT_INITIALIZED;
44 return;
45 }
47 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Importing()");
48 fd_ = fd;
49 handler_ = new SocketHandler(this, fd);
51 nsresult rv = stservice_->AttachSocket(fd_, handler_);
52 if (!NS_SUCCEEDED(rv)) {
53 *result = rv;
54 return;
55 }
57 TL_SET_STATE(TS_OPEN);
59 *result = NS_OK;
60 }
62 int TransportLayerPrsock::SendPacket(const unsigned char *data, size_t len) {
63 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "SendPacket(" << len << ")");
64 if (state_ != TS_OPEN) {
65 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Can't send packet on closed interface");
66 return TE_INTERNAL;
67 }
69 int32_t status;
70 status = PR_Write(fd_, data, len);
71 if (status >= 0) {
72 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Wrote " << len << " bytes");
73 return status;
74 }
76 PRErrorCode err = PR_GetError();
77 if (err == PR_WOULD_BLOCK_ERROR) {
78 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Write blocked");
79 return TE_WOULDBLOCK;
80 }
83 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Write error; channel closed");
84 TL_SET_STATE(TS_ERROR);
85 return TE_ERROR;
86 }
88 void TransportLayerPrsock::OnSocketReady(PRFileDesc *fd, int16_t outflags) {
89 if (!(outflags & PR_POLL_READ)) {
90 return;
91 }
93 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "OnSocketReady(flags=" << outflags << ")");
95 unsigned char buf[1600];
96 int32_t rv = PR_Read(fd, buf, sizeof(buf));
98 if (rv > 0) {
99 // Successful read
100 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Read " << rv << " bytes");
101 SignalPacketReceived(this, buf, rv);
102 } else if (rv == 0) {
103 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Read 0 bytes; channel closed");
104 TL_SET_STATE(TS_CLOSED);
105 } else {
106 PRErrorCode err = PR_GetError();
108 if (err != PR_WOULD_BLOCK_ERROR) {
109 MOZ_MTLOG(ML_DEBUG, LAYER_INFO << "Read error; channel closed");
110 TL_SET_STATE(TS_ERROR);
111 }
112 }
113 }
115 NS_IMPL_ISUPPORTS0(TransportLayerPrsock::SocketHandler)
116 } // close namespace